{"id":39719,"date":"2020-04-10T21:04:25","date_gmt":"2020-04-10T17:04:25","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=39719"},"modified":"2021-01-19T18:20:40","modified_gmt":"2021-01-19T14:20:40","slug":"news-you-mightve-missed-7-10-april","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-7-10-april\/","title":{"rendered":"News You Might\u2019ve Missed. 7-10 April"},"content":{"rendered":"<p>What's new this week in the news for MSPs? Amazon releases its new application for Windows migrations, Microsoft buys corp.com, a PSA on fake Zoom installers, and phishing scammers are impersonating some prominent government officials. Let's see what's going on.<\/p>\n<p><!--more--><\/p>\n<h2>AWS Starts Its Windows Migration Accelerator Application<\/h2>\n<p>Amazon Web Services first launched a preview of its new application, Migration Acceleration for Windows Program (AWS MAP), in December 2019 at <a href=\"https:\/\/siliconangle.com\/2019\/12\/17\/analysis-drifting-back-clouds-aws-reinvent\/\">AWS re:Invent<\/a>. This week they have released it for general availability. It is a service designed to assist customers in handling large-scale migrations of Windows-based workloads to AWS. To reduce the risks associated with switching to the cloud, Amazon has included access to services like prescriptive guidance, consulting with AWS experts and tools, training, and service credits.<\/p>\n<p>It can also help customers reduce their licensing costs through the adoption of cloud-native and open-source technologies. After an assessment that checks for migration readiness, the next step aims to fix any problems identified. Finally, with the help of Amazon's ProServe team and Amazon Partner Network companies, it carries out the actual migration.<\/p>\n<h2>Corp.com Bought by Microsoft to Stop Windows Account Hijacking<\/h2>\n<p>To prevent its use by scammers stealing Windows credentials, monitoring customer traffic, or serving malicious files, Microsoft has purchased the corp.com domain. Previously, it was held by internet domain name investor Mike O'Connor, who has held the domain for the past 26 years and has always been hesitant to sell it.<\/p>\n<p id=\"last\">Historically, Microsoft recommended companies to use \u201cCORP\u201d as the name of their Active Directory when configuring their Windows network. Since the Internet and DNS are now more integrated with Windows network domains, those using \u201cCORP\u201d for Active Directory could run into DNS issues due to name collisions with the real corp.com domain on the Internet. If malicious actors used the corp.com Internet domain, it would likely permit them to distribute infected files or malware, or even misappropriate Windows user credentials. They send user accounts and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/understanding-the-windows-credential-leak-flaw-and-how-to-prevent-it\/\">hashed passwords<\/a> to the server, and that would make them vulnerable when they try to access network shares.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Microsoft now advises that you should own any domain you intend to use for your Active Directory Services on a Windows network, to stop any DNS name collisions.<\/p>\n<h2>PSA: Zoom Installer Impersonators Distributing Malware<\/h2>\n<p>With Zoom videoconferencing services growing in popularity, attackers are making use of it to distribute installers packaged with malware applications. Social distancing and remote working have led to people spending more time inside, using Zoom services for meetings, classes, and virtual hangouts.<\/p>\n<p>Armed with this data, threat actors are distributing Zoom client software packaged together with malware like coin miners, remote access trojans, and adware bundles.<\/p>\n<p>Most recently, <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer\/\">Trend Micro<\/a> found a Zoom installer spreading a cryptocurrency miner on the victim's computer. According to Trend Micro, \"We found a Coinminer bundled with the legitimate installer of video conferencing app Zoom, luring users who want to install the software but end up unwittingly downloading a malicious file.\" This malware tries to use your GPU and CPU to search for the Monero cryptocurrency and may harm the hardware in your PC by causing your computer to slow down and possibly get overheated.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE ASSETS<\/div>\n<div class=\"call-to-action__title\">MSP\u2019s Assets to Stay Safe from Phishing<\/div>\n<div class=\"call-to-action__text\">Check out our assets that will help you to minimize the risk of a phishing attack, reduce the possible damage and increase the\u00a0security awareness.<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-a13a0279-a667-42d1-8ecd-608964d3c162\" data-portal=\"5442029\" data-id=\"a13a0279-a667-42d1-8ecd-608964d3c162\"><span class=\"hs-cta-node hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\" id=\"hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a13a0279-a667-42d1-8ecd-608964d3c162\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing_CTA-1.png\" alt=\"WP icon\" \/><span style=\"font-size: 1rem;\">\u00a0<\/span><span style=\"font-size: 1rem;\">\u00a0<\/span><\/div>\n<\/div>\n<h2>Phishing Scammers Impersonating the White House and Vice President Pence<\/h2>\n<p>That email in your inbox may not be from who you think. Phishing scammers have emailed potential victims as from the White House on behalf of President Trump, and others as Vice President Pence. These emails come with a payload that distributes malware or performs extortion scams.<\/p>\n<p>The email security firm Inky <a href=\"https:\/\/www.inky.com\/hubfs\/Understanding%20Phishing%20-%20Operation%20White%20House.pdf\">found and reported<\/a> this phishing scam being perpetrated by threat actors purporting to be from the White House, sending out coronavirus guidelines on behalf of President Trump.<\/p>\n<p>The emails state they are the latest \"Coronavirus Guidelines for America,\" and then prompt the victim to click on a hyperlink to download a document. A spoof White House web page then loads in their browser, containing a hyperlink to \"Download and read the full document.\" Finally, it asks the victim to download a malicious Word document that prompts them to \u201cEnable Editing\u201d and \u201cEnable Content\u201d to view it. This malicious code launches an attack on the victim's computer.<\/p>\n<p>Another phishing scam purports to be from Vice President Pence. In it, the \u201cpolitician\u201dclaims to have just come out of a security meeting about the recipient's company. This almost feels like an extortion scam.<\/p>\n<h2>That's a Wrap<\/h2>\n<p>That's the week in summary. I hope this overview has been helpful. MSP360 is your resource for MSP news. Stay safe and healthy, and check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Amazon releases its new application for Windows migrations, Microsoft buys corp.com, a PSA on fake Zoom installers, and phishing scammers are impersonating some prominent government officials. Let&#8217;s see what&#8217;s going on.<\/p>\n","protected":false},"author":84,"featured_media":39721,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-39719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/39719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=39719"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/39719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/39721"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=39719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=39719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=39719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}